Sciweavers

1466 search results - page 45 / 294
» Priority scheduling in wireless ad hoc networks
Sort
View
ADHOCNOW
2003
Springer
14 years 26 days ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
MOBIHOC
2005
ACM
14 years 7 months ago
Distributed low-cost backbone formation for wireless ad hoc networks
Yu Wang 0003, Weizhao Wang, Xiang-Yang Li
LCN
2006
IEEE
14 years 1 months ago
Accuracy-Speedup Tradeoffs for a Time-Parallel Simulation of Wireless Ad hoc Networks
We introduce a scalable algorithm for time-parallel simulations of wireless ad hoc networks and report on our results. Our approach decomposes the simulation into overlapping temp...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
14 years 1 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...